Peter Vágner reshared this.

#UnifiedPush using #xmpp #Conversations :blobheart:

Now #fluffychat (#matrix) gets notifications instantly (using conversations.im server)

Just set what XMPP account (in any server) will get notified and share it in your device

unifiedpush.org/users/distribu…

Free/Open source FTW!!

APPS with UP service: unifiedpush.org/users/apps/

(you can set what server will manage the service, eventually: your own)

Peter Vágner reshared this.

Unknown parent

mastodon - Link to source

Suguru Hirahara

@krille
According to unifiedpush.org/users/distribu…

> Conversations is an XMPP instant messaging client for Android, with the ability to deliver UnifiedPush notifications using an existing XMPP account, on any server. This requires converting push notifications to XMPP messages first, which is done by a service hosted at up.conversations.im.

As far as I could understand,

incoming notification --> up.conversations.im (Push server) --> Conversation (Distributor)

Peter Vágner reshared this.

This evening I pushed a #Prosody community module that acts as a #UnifiedPush server. It allows apps on your phone to receive push notifications, using #XMPP as the delivery channel instead of Google's proprietary FCM or regular polling.

It uses a protocol devised and implemented by @daniel and all credit goes to him for this idea and first implementations.

It's all experimental stuff, but I'm already using it to get realtime notifications in #Fedilab 🙂

modules.prosody.im/mod_unified…

reshared this

Peter Vágner reshared this.

Very much intrigued by this new player listed on the HIMS International website, the SensePlayer. I wonder if they are planning to unveil it in the US at the ATIA conference in a few weeks. Anyone know anymore about this one? himsintl.com/en/daisyplayer/vi…

reshared this

Peter Vágner reshared this.

#Conversations 2.12.0 is now a #UnifiedPush distributor! Check out how to set it up here:

unifiedpush.org/users/distribu…

youtube.com/watch?v=wKTk6XGMp3…

Thanks @daniel @mattj!

reshared this

Peter Vágner reshared this.

Now the first "public beta" of my little "adbsync" script is tagged and available at

codeberg.org/izzy/adbsync/rele…

Should be stable enough to be released to the public (though its code was public from the very beginning). adbsync lets you sync directories between your #Android device(s) and your (#Linux) PC without any special app, just utilizing things like rsync, adb, adbfs – and jq (to parse the JSON config file).

Give it a try, feedback welcome :awesome:

Peter Vágner reshared this.

in reply to [moved] Floppy 💾

@floppy adbsync does not use any "rooted features". It uses adbfs-rootless (sic!) to access the Android file system, and some (rootless) ADB calls to adjust timestamps (when syncing TO the device, as adbfs doesn't support all attributes). Depending on the directory size, it' not the fastest (I e.g. notice syncing my TiBu/Seedvault backup directories always takes several minutes even when just synced 5 minutes before).
(1/2)
in reply to IzzyOnDroid ✅

@floppy (2/2) but then, high performance is not on the top of my list, reliability is. Once I'm satisfied all is working as it should (which meanwhile seems the case, hence the tag; I even dared enabling deletion with one-way syncs) I'll set up a nightly cron job at e.g. 4 am. No need to watch it live. Devices connected at the time will be synced, and I can watch the logs anytime later if I wish to.

Adebar: great, take a look at the example docs it generated: izzy.codeberg.page/adebar/

in reply to IzzyOnDroid ✅

I think it's a pretty elegant solution to use adbfs for elaborate syncing. I tried to go that direction in the past, but I think my old hardware got in the way in the end.

I had a look at adbsync and I like it a lot! I had some minor issues (details follow), but it seems to be working nicely. Pretty impressive you went all the way through directory tree traversal and working around the timestamp limitations!

in reply to [moved] Floppy 💾

I had problems with spaces and special characters in filenames when syncing and could get it fixed by adapting sync2dev() a little.

termbin.com/w1ls

I still get some strange rsync errors, but they don't seem to impact anything.

rsync: [sender] readdir("[local-path]/[android-path]/."): Input/output error (5)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1326) [sender=3.2.4]

in reply to [moved] Floppy 💾

@floppy 1) don't use spaces in names, they always cause trouble
2) could you please put that into an issue in the repo, or a PR?
3) yes, those errors happen when syncing TO the device, Guess why I had to work around that with some special rsync options and manual timestamp adjustments 🙈 That's caused by adbfs, see github.com/spion/adbfs-rootles…
in reply to IzzyOnDroid ✅

That is really true, at least as far as only the actual account creation is concerned.

But before that I wanted to settle on some kind of way of handling my online identities. For privacy reasons I want to keep different interests, stuff to be put online (so much), and social interactions deliberately dissociated. As for in this case, I haven't completely settled on e.g. a proper online name for the nerdier interests. ("floppy" is nice, but wasn't intended to be final. 🙂)

in reply to [moved] Floppy 💾

I haven't made it to Codeberg yet, so in the interest of not delaying it until I forget, I'll drop some thoughts here quickly. I hope that's ok. :)

In terms of documentation, I think it might be good for people less familiar with rsync to point out that in the config's .devices[].sync[].{devdir,pcdir} should keep the trailing slash. (Or some handling in the script might be nice.)

in reply to [moved] Floppy 💾

I prefer to log to stdout only, which afaict is the unspecified option. If you think this might be interesting to others, this functionality could be documented explicitly. :) (Alternatively maybe logging to a file, but really these are just some pointers without acute need.)

I'm pretty swamped at the moment, so I might need a few more days, but I'll give adbsync a more thorough test and get back to you in a while!

in reply to [moved] Floppy 💾

@floppy log to stdout only: "logfile":"none" – and maybe 2>&1 if you really want to re-route errors there too. And yes, that is documented explicitly – see inside the doc/ dir 😉

Logging to a file: Sure, same thing and also documented: "logfile":"/path/to/logfile". Everything that's not just empty, "none" or "syslog" is expected to be a file name.

in reply to [moved] Floppy 💾

@floppy with the latest commit, adbsync makes sure devdir & pcdir have a trailing slash (if not it adds it), so docu must only point out it must be dirs (not a file name) – so it's your last wish I just implemented :awesome:

Further, no longer adjusting timestamps on push. Guess what I just discovered: "adb push" supports a `--sync` parameter only pushing newer files & taking care for timestamps. "adb pull" unfortunately does not support that or rsync+adbfs would only be needed for "--delete"…

in reply to IzzyOnDroid ✅

I am not subscribed to many issues or projects, but incidentally I am for adbfs-rootless (for a long time actually) and incidentally I found your comments in my email inbox today. :)

Thank you for the update also! adb's parameter sounds like good news, at least partially. Maybe they fix the "pull" sub-command too some time.

Thanks for taking care of the trailing slashes! 😉 I think other people checking out the project will benefit greatly there. :)

Peter Vágner reshared this.

The Atlassian Accessibility webpage: atlassian.com/accessibility Nice. They have a lot of work to do! #a11y #jira #confluence #accessibility #atlassian

Peter Vágner reshared this.

Peter Vágner reshared this.

I scanned every package on PyPi and found 57 live AWS keys tomforb.es/i-scanned-every-pac…

reshared this

Peter Vágner reshared this.

Listen to the @podjournal podcast 🎧️ 🇩🇪, using a Podcasting 2.0 app, and follow it on the Fediverse.
In this 1st episode, @Schaarsen talks about @Castopod, Podcasting 2.0, Podlove, the Fediverse, Pocket Casts and WordPress.
With a piece from @Podnews Weekly by @samsethi and @jamescridland with @yassinedoghri and @benjaminbellamy as guests.
RSS tip by @js
English subtitles by Whisper, manually corrected with Aegisub. 📺️ 🇺🇸
🗒️ Show notes: 👉️ podjournal.de/@podjournal/epis…

reshared this

Peter Vágner reshared this.

As a hobby, I hack instant messaging gateways from various chat "apps" to XMPP (XMPP is to Whatsapp what the fediverse is to Twitter). Slidge (the name I gave to my hobby software thingy) has been mostly usable for me for a few weeks, so I decided to talk about it a little in my blog, by pretending some milestone has been reached and calling it a "release candidate".

nicoco.fr/blog/2023/01/08/slid…

Peter Vágner reshared this.

in reply to 0 (shadowbanned)

@0

- signal, telegram, whatsapp: revokable, "per device" access ~token
- discord, mattermost: slidge login process = "get your access token from the web UI via dev browser dev tools" 🤡
- facebook, steam: optional 2FA (but right now, password is stored slidge-side anyway, possible area of improvement). they used to have "revokable application password" but I've had less success with them recently
Steam is the largest game store for PC, with social network-like features.

Peter Vágner reshared this.

My blogpost on how to verify your #Mastodon account and how to establish a chain of trust all the way to #CzechPoint verification, and generally why it's good to have a domain as your online identity.
blog.eischmann.cz/2023/01/05/o…

reshared this

Peter Vágner reshared this.

I've been playing with #ChatGPT a lot since it came out on November 30th. A few days ago, I decided to have a bit of a conversation with it about the threat it might pose to the future of digital #accessibility.

The resulting conversation surprised me beyond anything I could ever imagine. Why don't you take a look? :)

inklusiv.ca/will-chatgpt-threa…

This entry was edited (3 years ago)

reshared this

Peter Vágner reshared this.

One thing I wanted to do for years was to experiment with Conversations acting as a push provider for apps that don’t maintain their own TCP connection (Tusky.app, Ltt.rs, …).

@unifiedpush’s recent post on the @fdroidorg blog¹ renewed my interested in this topic and I've just merged code that make Conversations a UnifiedPush Distributor.

I’m already receiving my @Tusky notifications via #XMPP 🥳

¹: f-droid.org/en/2022/12/18/unif…

reshared this

Unknown parent

mastodon - Link to source

Steven Roose

It could be an alternative UnifiedPush client and have its own persistent websocket connection for users that don't have a Jabber account? I thought it could already wake up other apps though, but I never actually used it fully. But I had an app that had push notifications through Gotify.
in reply to Daniel Gultsch

Great! I'm using UnifiedPush for @apps

A list of subscribed topics like in #ntfy [1] would be great!
And maybe some way to test if UnifiedPush is successfully set up.
(maybe that should even be tested once a day in background)

Also could Conversations list in the server information if the XMPP server itself is a UnifiedPush proxy and can be used instead of up.conversations.im ?
(of that is technically possible)

[1] ntfy.sh/

Peter Vágner reshared this.

I'm willing to pay up to $10,000 (USD), to whomever I need to pay, to solve the #GNOME AT keyboard input handling problem once and for all. Currently, toolkits implementing AT-SPI have to pass all keyboard events to the AT-SPI registry, then wait for a response on whether the event should be processed as usual. No other platform does something like this, and this unique platform-specific requirement is a major complication for #AccessKit. I want to get this fixed. #accessibility

reshared this

Peter Vágner reshared this.

Everyone knows I love doing cool stuff with #code, and last night I built a #wxPython gui for the #whisperAI transcription library and put it on GitHub. I have a lot to do on it, but it is really neat. Check it out. github.com/mikedoise/whisperui

Peter Vágner reshared this.

in reply to Michael Doise

Are you aware of Whisper CPP? It might be something worth embedding for people who have a decent CPU, but no good GPU. It works especially well on M1, if Mac OS is something you’re willing to support. The library exposes a super simple C ABI, so it shouldn’t be hard to do github.com/ggerganov/whisper.c…
Peter Vágner reshared this.

It's trivial to determine the real IP of a Mastodon server behind Cloudflare. All it takes is one well-crafted request:

gist.github.com/cutiful/4f36da…

I wonder how many instance admins using Cloudflare know about this? My hunch is most do not, because the primary justification I see for using Cloudflare here is DDoS protection.

Cloudflare won't help if the attacker knows your origin IP, and you can't hide that with Cloudflare alone, due to the nature of ActivityPub.

#MastoAdmin #InfoSec

reshared this

Peter Vágner reshared this.

For those who like to experiment: I've now implemented root-based app backup/restore with #Adebar (after 3 people reported the corresponding scripts to do their job fine). Just pushed it to Codeberg, so if you want to give it a try, fetch the latest commit from codeberg.org/izzy/Adebar and give it a go :awesome:

#Android #Backup #Restore

Peter Vágner reshared this.

Peter Vágner reshared this.

Boost request for a person who did an awesome thing for accessibility.
Hey folks, I would like to call upon the Mastodon community to boost the individual who made the Youtube video linked here. Let me explain. This wonderful person took a video that was only published in Japanese, (a video where Nintendo's Sakurai discussed The Last of Us Part 1's accessibility features in great detail talking about how great they were for quality of life), and on their own time, with their own setup, voluntarily, dubbed the video in English for us blind folks so we could appreciate it too. This especially meant a lot to me, as I worked on those accessibility features, and felt kinda honored to be indirectly complimented by Sakurai. Anyway, long story short, if you ever need this kind of voiceover work done, or audio editing, hire this guy. They deserve some promotion after this awesome work. Oh, and they are also a coder!!! Hire them for that, too! :) youtube.com/watch?v=dWosA-2-Ze…

reshared this

Peter Vágner reshared this.

Music 2022: Hands Up!

My Hands Up Top 5 according to fb2k playback stats.

5. Sound Artz - Remain of Rain
youtube.com/watch?v=cT9DPHKa02…

4. S3RL feat. Krystal - Tripping on Mushrooms (PerkyStella Radio Cut)
youtube.com/watch?v=hh0gSZQ4yh…

3. Casaris - Yesterday
youtube.com/watch?v=eCknKQBk1-…

2. SNGR - Heaven
youtube.com/watch?v=8oKYe8cat4…

1. Withard & TreBle Dance - Guardians Of Bass
youtube.com/watch?v=W0ypUcE6_y…

# HandsUp #Dancecore #Music2022

Peter Vágner reshared this.

Peter Vágner reshared this.

I recently wrote a post detailing the recent #LastPass breach from a #password cracker's perspective, and for the most part it was well-received and widely boosted. However, a good number of people questioned why I recommend ditching LastPass and expressed concern with me recommending people jump ship simply because they suffered a breach. Even more are questioning why I recommend #Bitwarden and #1Password, what advantages they hold over LastPass, and why would I dare recommend yet another cloud-based password manager (because obviously the problem is the entire #cloud, not a particular company.)

So, here are my responses to all of these concerns!

Let me start by saying I used to support LastPass. I recommended it for years and defended it publicly in the media. If you search Google for "jeremi gosney" + "lastpass" you'll find hundreds of articles where I've defended and/or pimped LastPass (including in Consumer Reports magazine). I defended it even in the face of vulnerabilities and breaches, because it had superior UX and still seemed like the best option for the masses despite its glaring flaws. And it still has a somewhat special place in my heart, being the password manager that actually turned me on to password managers. It set the bar for what I required from a password manager, and for a while it was unrivaled.

But things change, and in recent years I found myself unable to defend LastPass. I can't recall if there was a particular straw that broke the camel's back, but I do know that I stopped recommending it in 2017 and fully migrated away from it in 2019. Below is an unordered list of the reasons why I lost all faith in LastPass:

- LastPass's claim of "zero knowledge" is a bald-faced lie. They have about as much knowledge as a password manager can possibly get away with. Every time you login to a site, an event is generated and sent to LastPass for the sole purpose of tracking what sites you are logging into. You can disable telemetry, except disabling it doesn't do anything - it still phones home to LastPass every time you authenticate somewhere. Moreover, nearly everything in your LastPass vault is unencrypted. I think most people envision their vault as a sort of encrypted database where the entire file is protected, but no -- with LastPass, your vault is a plaintext file and only a few select fields are encrypted. The only thing that would be worse is if...

- LastPass uses shit #encryption (or "encraption", as @sc00bz calls it). Padding oracle vulnerabilities, use of ECB mode (leaks information about password length and which passwords in the vault are similar/the same. recently switched to unauthenticated CBC, which isn't much better, plus old entries will still be encrypted with ECB mode), vault key uses AES256 but key is derived from only 128 bits of entropy, encryption key leaked through webui, silent KDF downgrade, KDF hash leaked in log files, they even roll their own version of AES - they essentially commit every "crypto 101" sin. All of these are trivial to identify (and fix!) by anyone with even basic familiarity with cryptography, and it's frankly appalling that an alleged security company whose product hinges on cryptography would have such glaring errors. The only thing that would be worse is if...

- LastPass has terrible secrets management. Your vault encryption key always resident in memory and never wiped, and not only that, but the entire vault is decrypted once and stored entirely in memory. If that wasn't enough, the vault recovery key and dOTP are stored on each device in plain text and can be read without root/admin access, rendering the master password rather useless. The only thing that would be worse is if...

- LastPass's browser extensions are garbage. Just pure, unadulterated garbage. Tavis Ormandy went on a hunting spree a few years back and found just about every possible bug -- including credential theft and RCE -- present in LastPass's browser extensions. They also render your browser's sandbox mostly ineffective. Again, for an alleged security company, the sheer amount of high and critical severity bugs was beyond unconscionable. All easy to identify, all easy to fix. Their presence can only be explained by apathy and negligence. The only thing that would be worse is if...

- LastPass's API is also garbage. Server-can-attack-client vulns (server can request encryption key from the client, server can instruct client to inject any javascript it wants on every web page, including code to steal plaintext credentials), JWT issues, HTTP verb confusion, account recovery links can be easily forged, the list goes on. Most of these are possibly low-risk, except in the event that LastPass loses control of its servers. The only thing that would be worse is if...

- LastPass has suffered 7 major #security breaches (malicious actors active on the internal network) in the last 10 years. I don't know what the threshold of "number of major breaches users should tolerate before they lose all faith in the service" is, but surely it's less than 7. So all those "this is only an issue if LastPass loses control of its servers" vulns are actually pretty damn plausible. The only thing that would be worse is if...

- LastPass has a history of ignoring security researchers and vuln reports, and does not participate in the infosec community nor the password cracking community. Vuln reports go unacknowledged and unresolved for months, if not years, if not ever. For a while, they even had an incorrect contact listed for their security team. Bugcrowd fields vulns for them now, and most if not all vuln reports are handled directly by Bugcrowd and not by LastPass. If you try to report a vulnerability to LastPass support, they will pretend they do not understand and will not escalate your ticket to the security team. Now, Tavis Ormandy has praised LastPass for their rapid response to vuln reports, but I have a feeling this is simply because it's Tavis / Project Zero reporting them as this is not the experience that most researchers have had.

You see, I'm not simply recommending that users bail on LastPass because of this latest breach. I'm recommending you run as far way as possible from LastPass due to its long history of incompetence, apathy, and negligence. It's abundantly clear that they do not care about their own security, and much less about your security.

So, why do I recommend Bitwarden and 1Password? It's quite simple:

- I personally know the people who architect 1Password and I can attest that not only are they extremely competent and very talented, but they also actively engage with the password cracking community and have a deep, *deep* desire to do everything in the most correct manner possible. Do they still get some things wrong? Sure. But they strive for continuous improvement and sincerely care about security. Also, their secret key feature ensures that if anyone does obtain a copy of your vault, they simply cannot access it with the master password alone, making it uncrackable.

- Bitwarden is 100% open source. I have not done a thorough code review, but I have taken a fairly long glance at the code and I am mostly pleased with what I've seen. I'm less thrilled about it being written in a garbage collected language and there are some tradeoffs that are made there, but overall Bitwarden is a solid product. I also prefer Bitwarden's UX. I've also considered crowdfunding a formal audit of Bitwarden, much in the way the Open Crypto Audit Project raised the funds to properly audit TrueCrypt. The community would greatly benefit from this.

Is the cloud the problem? No. The vast majority of issues LastPass has had have nothing to do with the fact that it is a cloud-based solution. Further, consider the fact that the threat model for a cloud-based password management solution should *start* with the vault being compromised. In fact, if password management is done correctly, I should be able to host my vault anywhere, even openly downloadable (open S3 bucket, unauthenticated HTTPS, etc.) without concern. I wouldn't do that, of course, but the point is the vault should be just that -- a vault, not a lockbox.

I hope this clarifies things! As always, if you found this useful, please boost for reach and give me a follow for more password insights!

This entry was edited (3 years ago)
in reply to Jeremi M Gosney

Don't forget about #KeeperSecurity, the only FedRAMP Authorized password manager with the longest-standing SOC 2 and ISO 27001 certifications in the industry. We stand by our extremely strict security standards. Here's a side-by-side comparison of how we stack up against LastPass: keepersecurity.com/blog/2022/0…. Our blog also features comparisons against other password managers on the market.
in reply to Keeper Security

@KeeperSecurity folks considering Keeper as a password manager should be aware of their litigious history with the security community: techdirt.com/2018/03/09/keeper…

They have a bug bounty now (bugcrowd.com/keepersecurity ) but it does not allow researchers to disclose bugs (see “Disclosure” section) which to me represents a failure to engage with the security community. No amount of acronym certifications will make that ok for such a critical piece of security infrastructure.

Peter Vágner reshared this.

Music 2022: Harder stuff!

Closing the series with my top 5 tracks of the harder styles. 🙂

5. Groove Coverage - Monsters in My Head (Quickdrop x Axel Oliver Remix)
youtube.com/watch?v=ZCiOlJ3X6D…

4. Basskiller, Rocco & Giorno - Stay Away
youtube.com/watch?v=sirX_BavJJ…

3. Wildstylez - Hero
youtube.com/watch?v=kqagTSV75i…

2. Tokyo Machine & Weird Genius feat. LIGHTS - Last Summer (Gammer Remix)
youtube.com/watch?v=XUgn_G7URe…

1. The Pitcher - Play
youtube.com/watch?v=x2dBbzuAa7…

#Hardstyle #HardDance # UKHardcore #Music2022

Peter Vágner reshared this.

Peter Vágner reshared this.

For screen reader users out there, Apple TV+ has implemented autoreading subtitles on the web. Just play any title and enable subtitles: reddit.com/r/tvPlus/comments/z… (Yes, I know the post is mine)

reshared this

Peter Vágner reshared this.

Music 2022: Female-fronted Symphonic Metal

Okay, so let's summarise 2022 in music. These were my Top 3 most-listened Female-fronted Symphonic Metal tracks of the year:

3. Blackbriar - Crimson Faces
youtube.com/watch?v=9zOVTkAMY9…

2. Battle Beast - Eye Of The Storm
youtube.com/watch?v=C7Z-IP2onY…

1. Visions Of Atlantis - Clocks / Melancholy Angel
youtube.com/watch?v=2ZBhE3HOwY…
youtube.com/watch?v=9RH8rVt4Z8…
#SymphonicMetal #Female-Fronted #music2022

Peter Vágner reshared this.

Peter Vágner reshared this.

I just found something awesome. This makes python code actually kinda cool. Python with braces. Because Python is awesome, but whitespace is awful.

Peter Vágner reshared this.

Peter Vágner reshared this.

Hello #Fediverse! #Pinetta is a decentralized FOSS social pinboard in the style of Pinterest. After a month of planning, we've settled on a basic game plan and are opening up our @Codeberg repo for contributions from devs and designers!

We'll be working on a prototype that uses #Python and #Django to get the basic functionality working. We'll also be hosting weekly sharing sessions on #CommunityBuilding principles to develop our Code of Conduct and a larger framework for community wellness. 🥳

Peter Vágner reshared this.

Peter Vágner reshared this.

With a delay, we arrive at the last window of the accessibility for the blind advent calendar.
This one might be known to some of you as the news has reached quite some peak in media outlets worldwide. Accessible Christmas was an app developed to let blind people enjoy the Christmas lights of Madrit through a geolocation-based audiodescription experience. The great thing about it was, you could also access these descriptions wherever you were. Many blind people do not have the privilege of worldwide mobility so bringing bits of the world closer to them is what I call an extension of accessible tourism. Describing the world you experience through textual blogs, social media postings, audio recordings and sharing interesting highlights of life in different countries is what you can do next year to make others travel even if they physically can't. If you're the one unable to travel, here are a couple of things that help me personally when I wish I could be elsewhere but can't:
1. Play a random radio station in a language you understand nothing of or find the music that you like coming from somewhere obscure or far away. I enjoy checking out local charts in other countries just to see how different languages fit into the music trends of today.
2. Try to find recordings of places on sites like Freesound or Soundcloud; close your eyes and imagine.
3. Read travel blogs, watch or listen to content on the Internet of others travelling where descriptions are abundant; research how topics that interest you are managed elsewhere.
4. Try to find penpals, somebody to exchange occasional packages with and simply make friends; if that's possible, try to find a local language conversation group, groups for people who have moved to your city etc. meet, ask questions but most of all, listen!
5. Maybe one day make your own advent calendar.
coolblindtech.com/this-app-all…
#Accessibility #Blind AdventCalendar #Spain #Travel #Tourism

reshared this

Peter Vágner reshared this.

The accessibility for the blind advent calendar: day 23 - Poland (try it yourself)
So Apple did flip the switch at last and today's window is ready for all of you to try out.
Zuzanka is an app made by Zatoichi, a Warsaw-based startup with one of my blind friends as a tester and head consultant. It reads out the expiry dates on products so it's perfect to run through everything in your fridge before Christmas to see whether your supplies are still safe to be consumed. Once you start it, it will beep continuously to tell you it is ready. Then, once something that it may consider to be a date is found in the camera, it will start beeping faster until it finally recognizes and speaks the date outloud. There is a handy tutorial added telling you where expiry dates are commonly found on different products. The app gives you a 24-hour trial period and a handful of subscription options which I believe should be affordable. There is a lifetime license option too capped at around 30 €.
The AI models for this app have been predominantly trained on products found in Polish supermarkets and I was successful using it on a pack of German Balsen chocolate biscuits so it is interesting to see whether this could work in other countries.
apps.apple.com/pl/app/zuzanka/…
#Accessibility #Blind #AdventCalendar #Poland #Mobile #Startup #Shopping

reshared this

Peter Vágner reshared this.

The accessibility for the blind advent calendar: day 22 - Czech Republic
I did not manage to post the window for yesterday, so it's double act time today.
All good things come in threes and as it happens, one of the things I did yesterday was taking part in the Clubhouse meeting of the Czech blind community where 2022 was summed up and different good things that happened in terms of assistive technology were named.
One of the solutions somebody pointed out was the ability to operate an ATM using the banking app of Ceska Sporitelna, one of the leading Czech banks.
Developed with the Covid pandemic in mind, the feature happened to also benefit blind users. The way it works is, every ATM supporting the feature displays a QR code on its screen by default. The user scans it using the dedicated feature in the Sporitelna app, confirms whether the ATM number detected is the same as the one written on the machine itself and once the connection is made, all of the operation: defining the amount of money to be withdrawn, confirmation, authorization etc. is being handled using the app. The money comes out, the operation is successful and everyone is happy.
The number of the machine can be verified either through the list of nearby machines in the app or via an accessible spreadsheet that either the bank or the community have put together, I'm not sure.
#Accessibility #Blind #AdventCalendar #CzechRepublic #Banking

Peter Vágner reshared this.